Industry Coverage icon

Build Ransomware Resilience in State and Provincial Government

A six-step suite of tools to build resilience across your organization.

Unlock a Free Sample
  • Ransomware is a high-profile threat that demands immediate attention:
    • Sophisticated ransomware attacks are on the rise and evolving quickly.
    • Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in only a few hours, which makes recovery a grueling challenge.
    • Executives want reassurance but aren't ready to write a blank check. Improvements must be targeted and justified.

Our Advice

Critical Insight

  • Resilience is not a trampoline, where you’re down one moment and up the next. It’s more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges.
  • Focus on what is in your organization’s control and cultivate strengths that allow you to protect assets, detect incursions, respond effectively, and recovery quickly.
  • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
  • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
  • Conventional approaches focus on response and recovery, which do nothing to prevent an attack and are often ineffective against sophisticated attacks.

Impact and Result

To prevent a ransomware attack:

  • Conduct a thorough assessment of your current state, identify potential gaps, and assess the possible outcomes of an attack.
  • Analyze attack vectors and prioritize controls that prevent ransomware attacks and implement ransomware protection and detection to reduce your attack surface.
  • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

Build Ransomware Resilience in State and Provincial Government Research & Tools

1. Build Ransomware Resilience in State and Provincial Government Storyboard – Research that provides an approach to implementing best-practice security controls and tools to protect assets, detect incursions, and respond effectively.

This research, a companion to Info-Tech’s Build Resilience Against Ransomware Attacks blueprint, serves state and provincial governments in enhancing an existing security strategy, meeting cyberinsurance requirements for an annual tabletop planning exercise, and improving an existing security incident management program with an additional focus on building ransomware resilience.

Unlock a Free Sample

Build Ransomware Resilience in State and Provincial Government

A six-step suite of tools to build resilience across your organization.

Analyst Perspective

Ransomware attacks are on the rise and quickly evolving.

The future of global security and prosperity rests on digital foundations. The challenge is to build a flourishing digital society that is resilient to cyberthreats and equipped with knowledge and capabilities to maximize opportunities and manage risks.

With increasing online and data usage, government databases have positioned themselves as major targets for hackers and acts of cyber warfare.

This client advisory is a companion to Info-Tech’s Build Resilience Against Ransomware Attacks blueprint. It provides a deeper look into the challenges that state and provincial governments face when combatting increasingly frequent and devastating ransomware attacks, and it offers a six-step suite of tools to help build resilience across your organization.

Neal Rosenblatt
Neal Rosenblatt
Principal Research Director
Info-Tech Research Group

Executive Summary

Your Challenge

Ransomware is a high-profile threat that demands immediate attention:

  • Sophisticated ransomware attacks are happening more frequently and evolving quickly.
  • Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in only a few hours, which makes recovery a grueling challenge.
  • Executives want reassurance but aren’t ready to write a blank check. Improvements must be targeted and justified.

Common Obstacles

Ransomware is more complex than other security threats:

  • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
  • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
  • Conventional approaches focus on response and recovery, which fail to prevent an attack and are often ineffective against sophisticated attacks.

Info-Tech's Approach

To prevent a ransomware attack:

  • Conduct a thorough assessment of your current state, identify potential gaps, and assess the possible outcomes of an attack.
  • Analyze attack vectors and prioritize controls that prevent ransomware attacks. Implement ransomware protection and detection to reduce your attack surface.
  • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

Info-Tech Insight

Resilience is not a trampoline, where you’re down one moment and up the next. It’s more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges. Focus on what your organization can control and cultivate strengths that allow you to protect assets, detect incursions, respond effectively, and recover quickly.

Ransomware attacks are on the rise and evolving quickly

“The future of global security and prosperity rests on digital foundations. The challenge is to build a flourishing digital society that is resilient to cyber threats and equipped with knowledge and capabilities to maximize opportunities and manage risks.”

– World Bank, 2023

Ransomware has continued its upward trend, with a more than twofold increase since 2020 (World Bank).

“Blocking the four key paths [credentials, phishing, exploiting vulnerabilities, and botnets] helps to block the most common routes ransomware uses to invade your network.”

– Verizon, 2022

Ransomware attack trends

Annual number of ransomware attacks worldwide, 2017-2021

Annual number of ransomware attacks worldwide, 2017-2021. Graph shows a 2.1X increase between 2020 and 2021.

* Calculated assuming 17% ransomware incident response from IBM’s “X-Force Threat Intelligence Index,” 2023, and the total number of ransomware attacks from SonicWall’s “2022 Cyber Threat Report.”

At-a-glance

Worldwide impact of all cyberattacks

3.67B

Total estimated number of cyberattack incidents, 2022*

10.5M

Number of records lost or stolen every day

438K

Number of records lost or stolen every hour

$5.2T

Estimated cost of cyberattacks, 2022

$10.5T

Estimated cost of cyberattacks by 2025

Cyberattacks hit the Asia-Pacific region hardest

The Asia-Pacific region holds the top spot as the most attacked region in 2022, accounting for 31% of incident response. Europe followed closely behind with 28% of attacks and North America saw 25%. Asia-Pacific and Europe saw higher proportions of cases, increasing 5 percentage points and 4 percentage points respectively from 2021 figures, with a significant drop in the Middle East from 14% to 4%.

Japan accounted for 91% of Asia-Pacific cases, the Philippines 5%, and Australia, India, and Vietnam each at 1.5%.

Manufacturing tops the list of attacked industries in this region, at 48%, followed by finance and insurance at 18%.

Geographic trends

Cyberattack incidents by global region, 2020-2022

In 2022, 25% of the world’s cyberattacks occurred within North America. The United States accounted for 80% of the region’s attacks compared to Canada’s 20%.

Source: “X-Force Threat Intelligence Index,” IBM Security, 2023.

Build Ransomware Resilience in State and Provincial Government preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Author

Neal Rosenblatt

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019